2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) 2016
DOI: 10.1109/icatcct.2016.7912065
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving in banking sector

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…In a financial context, the wide diffusion of cloud computing has caused an increase in the number of restrictions that financial firms apply to cloud applications 26 . To this aim, many solutions have been proposed and implemented to protect financially sensitive data against unauthorized access 27‐29 . One of the most recent one is the developing of a cryptographic‐based model sharing technique to securely outsource knowledge reflected in decision trees of multiple parties, designing a secure computation mechanism to facilitate privacy‐preserving knowledge transfer 30 …”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In a financial context, the wide diffusion of cloud computing has caused an increase in the number of restrictions that financial firms apply to cloud applications 26 . To this aim, many solutions have been proposed and implemented to protect financially sensitive data against unauthorized access 27‐29 . One of the most recent one is the developing of a cryptographic‐based model sharing technique to securely outsource knowledge reflected in decision trees of multiple parties, designing a secure computation mechanism to facilitate privacy‐preserving knowledge transfer 30 …”
Section: Related Workmentioning
confidence: 99%
“…26 To this aim, many solutions have been proposed and implemented to protect financially sensitive data against unauthorized access. [27][28][29] One of the most recent one is the developing of a cryptographic-based model sharing technique to securely outsource knowledge reflected in decision trees of multiple parties, designing a secure computation mechanism to facilitate privacy-preserving knowledge transfer. 30 The need for privacy preservation is very important also in the field of social networks, where billions of users share their personal data with various devices over the Internet on a daily basis.…”
Section: Motivations For Privacy Preserving Recommending Systemsmentioning
confidence: 99%